Miscellaneous Flashcards
What is Measurable Security ?
“All aspects of security mechanisms function, provide a clear benefit, & have metrics that can be recorded & analyzed.”
What ensures proper creation, implementation, & enforcement of a security policy?
Security Management Planning
Which kind of approach to building security policy is generally frowned upon by experts?
A bottom-up approach.
What are some elements of Threat Mode Diagrams ?
- Trust Boundaries
- Dataflow Paths
- Input Points
- Privileged Operations
- Details about Security Stance/Approach
What is DREAD ?
Rating for threats: Disaster, Reproducibility, Exploitability, Affected Assets, Discoverability).
What is the focus of Risk Assessment ?
Assets, and potential loss of or damage to assets.
What are three Threat Modeling approaches?
- Focused on Assets
- Focused on Attackers
- Focuses on Software
What is STRIDE ?
Microsoft Threat Model.
- Spoofing
- Tampering
- Repudiation
- Info Disclosure
- DoS
- Elevation of Privileges
What is PASTA ?
Risk-centric Threat Model
Stage 1: Definition of objectives (DO)
Stage 2: Define Tech Scope (DTS)
Stage 3: App Decomposition & Analysis (ADA)
Stage 4: Threat Analysis (TA)
Stage 5: Weakness & Vulnerability Analysis (WVA)
Stage 6: Attack Modeling & Simulation (AMS)
Stage 7: Risk Analysis & Management (RAM)
What is VAST ?
Visual, Agile, & Simple Threat Modeling
Differentiate Due Diligence & Due Care
Due Diligence is planning
Due Care is doing
What is a Security Policy ?
Overview/Generalization of an organization’s security needs. Covers:
- Scope of the security needed
- Assets that need protection
- Extent to which security should go to protect assets
Security Policies are required to show due diligence.
What are COBIT’s Six Principles?
- Provide Stakeholder Value
- Use a holistic approach
- Have a dynamic governance system
- Keep governance separate from management
- Tailor security to enterprise needs
- Use an end-to-end governance system
List some security frameworks
- NIST 800-53 rev5 (Security & Privacy Controls for Information Systems and Organizations)
- CIS (Center for Internet Security)
- NIST Risk Management Framework (RMF)
- NIST CSF (Cybersecurity Framework)
- ISO 27000 series
- ITIL (from the British Government)
Who should lead an InfoSec Team?
A CISO.